The Path Less Traveled - Abusing Kubernetes Defaults

The Path Less Traveled - Abusing Kubernetes Defaults

Black Hat via YouTube Direct link

Deploy Pod

18 of 35

18 of 35

Deploy Pod

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Path Less Traveled - Abusing Kubernetes Defaults

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Thank you
  3. 3 Introductions
  4. 4 Check your assumptions
  5. 5 Kubernetes defaults
  6. 6 What is Kubernetes
  7. 7 What does Kubernetes mean
  8. 8 How does Kubernetes work
  9. 9 Kubernetes components
  10. 10 Kubernetes API
  11. 11 Kubernetes Misconfigurations
  12. 12 CubeKettle
  13. 13 Apply
  14. 14 API Server
  15. 15 Pod Scheduling
  16. 16 Demonstration
  17. 17 Pod manifest
  18. 18 Deploy Pod
  19. 19 System Access
  20. 20 Enumeration Tool
  21. 21 Summary
  22. 22 Host Path
  23. 23 Docker
  24. 24 Docker manifest
  25. 25 Takeaway
  26. 26 Container Parts
  27. 27 Lets play with it
  28. 28 Takeaways
  29. 29 Is there any way to mitigate
  30. 30 Admission Control
  31. 31 Hide Security Policies
  32. 32 Restrict Security Policies
  33. 33 Quit 5 Security Policies
  34. 34 Conclusions
  35. 35 Does Admission Control Fix Everything

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.